IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Web Access Control

RSS Feed    Add to Google    Add to My Yahoo!
Web Access Control Reports
 
Case Study: Secure File Sharing with Investors
sponsored by IntraLinks, Inc
CASE STUDY: This case study examines how an identity and access management program can protect data shared with collaborators and investors. View now to learn how to mitigate data leaks and theft.
Posted: 01 May 2015 | Published: 04 Dec 2014

IntraLinks, Inc

Nissan Europe Drives Security with Dual-Chip Smart Cards
sponsored by HID
CASE STUDY: This case study focuses on Nissan Europe and how they easily enabled future applications and credentials by using a single dual-chip smart card. Read on to learn more about Nissan's success with ID cards and if this strategy is right for your security needs.
Posted: 24 Jul 2015 | Published: 25 Mar 2013

HID

Managed, Shared Resources: Public Cloud
sponsored by Dimension Data
WHITE PAPER: In this white paper, discover how one public cloud service in particular remains secure, scalable and convenient, and find out how it can pay off for your business.
Posted: 09 Apr 2015 | Published: 09 Apr 2015

Dimension Data

How to Mitigate the Risk of Insider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explains how to successfully ward off insider threats by altering the operating environment.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

Enabling Secure Anywhere, Anytime Access
sponsored by HID
WHITE PAPER: This white paper examines how to enable anywhere anytime access to users while providing a simple and secure experience for multi-channel computing.
Posted: 29 Jun 2015 | Published: 06 Mar 2014

HID

Managing and Securing Identities
sponsored by HID
EGUIDE: This expert e-guide presents a simple strategy to assess your IAM strength and offers 9 best practices for establishing effective IAM business rules
Posted: 09 Jun 2015 | Published: 06 May 2015

HID

A More Effective Approach to Scalable Data Classification
sponsored by Digital Guardian
WHITE PAPER: This white paper can help you easily focus your security on your most sensitive data by providing guidelines to effective data classification.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

Strategy and Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This white paper offers key tips on how to extend identity and access management (IAM) to not only keep security consistent across on-premise and cloud environments, but to help reduce costs and improve efficiency as well.
Posted: 13 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

Case Study: Globalscape® WAFS Expands the Panama Canal
sponsored by GlobalScape
CASE STUDY: This case study reveals a wide area file services solution that the engineering firms working on the Panama Canal expansion chose to securely exchange large files and collaborate efficiently.
Posted: 27 May 2014 | Published: 31 Dec 2013

GlobalScape

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement